Local privilege escalation in Genetec Update Service. An authenticated, low-privileged, Windows user could exploit this vulnerability to gain elevated privileges on the affected system.
Advisories

No advisories yet.

Fixes

Solution

This issue is fixed in Genetec Update Service 2.10.600 and all later versions. Internet connected Genetec Update Service will automatically update themselves.


Workaround

No workaround given by the vendor.

History

Thu, 26 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Genetec
Genetec update Service
Vendors & Products Genetec
Genetec update Service

Tue, 24 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
Description Local privilege escalation in Genetec Update Service. An authenticated, low-privileged, Windows user could exploit this vulnerability to gain elevated privileges on the affected system.
Weaknesses CWE-276
References
Metrics cvssV4_0

{'score': 5.8, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/CR:H/IR:H/AR:H/MVC:H/MVI:H/MVA:H/MSI:H/MSA:H/S:P/AU:N/V:C'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Genetec

Published:

Updated: 2026-02-26T14:44:07.658Z

Reserved: 2025-02-28T17:07:08.574Z

Link: CVE-2025-1789

cve-icon Vulnrichment

Updated: 2026-02-26T14:30:43.060Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-24T20:27:42.597

Modified: 2026-02-24T21:52:01.367

Link: CVE-2025-1789

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-25T11:35:41Z

Weaknesses